Description: himself wrote a practical encryption and decryption procedures, commonly used in the Application of the configuration file encryption and decryption, encrypted with the characters on the config file, decryption procedures can be called when declassified.
To Search:
File list (Check if you may need any files):